← Volver a CVEs
CVE-2012-1152
N/ADescripcion
Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado9/9/2012
Ultima modificacion4/29/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
ingy:yaml\
Debilidades (CWE)
CWE-134
Referencias
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html(secalert@redhat.com)
http://secunia.com/advisories/48317(secalert@redhat.com)
http://secunia.com/advisories/50277(secalert@redhat.com)
http://www.debian.org/security/2012/dsa-2432(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/09/6(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/10/4(secalert@redhat.com)
http://www.securityfocus.com/bid/52381(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=801738(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/73856(secalert@redhat.com)
https://rt.cpan.org/Public/Bug/Display.html?id=46507(secalert@redhat.com)
https://rt.cpan.org/Public/Bug/Display.html?id=75365(secalert@redhat.com)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48317(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50277(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2012/dsa-2432(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/09/6(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/10/4(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/52381(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=801738(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/73856(af854a3a-2127-422b-91ae-364da2661108)
https://rt.cpan.org/Public/Bug/Display.html?id=46507(af854a3a-2127-422b-91ae-364da2661108)
https://rt.cpan.org/Public/Bug/Display.html?id=75365(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.